General

  • Target

    122bfa4afc86831a41641bfcecc299de_JaffaCakes118

  • Size

    367KB

  • Sample

    240328-2xwwcabf93

  • MD5

    122bfa4afc86831a41641bfcecc299de

  • SHA1

    158d8a27b2aca4acd45088edd5f1eb6376854d9a

  • SHA256

    c2ca79f6d10d9e598eee6ca5ddc97be9193f802c3784d3c74c051e0114096815

  • SHA512

    ba3df9b4d2596f26148d7a55528188e70febdcbecd837a228f05fb8a8f10d74dda5e593cd116d43c8ebfdfaec4067e13d835d0d8103adb1a5a87f2437d6c6a99

  • SSDEEP

    6144:XrJQ6H75fCDrXHyX3zMEjRTQV8KjmSDdHvoOrrlc:X9tJCnC3IEjBQmKjmMwOrJc

Malware Config

Extracted

Family

cobaltstrike

Botnet

1

C2

http://192.168.222.139:80/match

Attributes
  • access_type

    512

  • host

    192.168.222.139,/match

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • polling_time

    60000

  • port_number

    80

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCazWg8exxAVQjvR/5w327Y78gwyuDH0YMzNHmHxTH5u5ZJfzyYvM+WxUYB3Zb4WRoQbnSTq9haPn6k8OKo4ZZjvgbTj3eWbc5emAS9eanVAd36xLhbGSP0cthHu5mscOLLunrJEWPyi/alG9rkdiud4mPCpv1M/Dq+nqxDEkwGowIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)

  • watermark

    1

Targets

    • Target

      122bfa4afc86831a41641bfcecc299de_JaffaCakes118

    • Size

      367KB

    • MD5

      122bfa4afc86831a41641bfcecc299de

    • SHA1

      158d8a27b2aca4acd45088edd5f1eb6376854d9a

    • SHA256

      c2ca79f6d10d9e598eee6ca5ddc97be9193f802c3784d3c74c051e0114096815

    • SHA512

      ba3df9b4d2596f26148d7a55528188e70febdcbecd837a228f05fb8a8f10d74dda5e593cd116d43c8ebfdfaec4067e13d835d0d8103adb1a5a87f2437d6c6a99

    • SSDEEP

      6144:XrJQ6H75fCDrXHyX3zMEjRTQV8KjmSDdHvoOrrlc:X9tJCnC3IEjBQmKjmMwOrJc

MITRE ATT&CK Matrix

Tasks